Detection of Collaborative Cyber-Attacks through Correlation and Time Dependency Analysis

被引:0
|
作者
Thoma, Marios [1 ]
Hadjicostis, Christoforos N. [1 ]
机构
[1] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
来源
PROCEEDINGS OF THE 18TH MEDITERRANEAN ELECTROTECHNICAL CONFERENCE MELECON 2016 | 2016年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we consider the detection of suspiciously high correlation between malicious Internet users that are collaborating in order to cause a Denial of Service (DoS) Attack. The main goal is to recognise cyber incidents (more specifically, collaboration/dependency between different users) in order to ultimately isolate their behavior and avoid the consequenses of the DoS attack. The method relies on the analysis of the data traffic across the concerned network (with both incoming and outgoing traffic) in an effort to identify correlations between different users. The paper models normal and malicious behaviour via hidden Markov models, and analyses the performance of the method using both mathematical reasoning and simulations.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Detection of Cyber-Attacks in Collaborative Intersection Control
    Keijzer, Twan
    Jarmolowitz, Fabian
    Ferrari, Riccardo M. G.
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 62 - 67
  • [2] Detection of collaborative misbehaviour in distributed cyber-attacks
    Thoma, Marios
    Hadjicostis, Christoforos N.
    COMPUTER COMMUNICATIONS, 2021, 174 : 28 - 41
  • [3] Blockchain-Inspired Collaborative Cyber-Attacks Detection for Securing Metaverse
    Zainudin, Ahmad
    Putra, Made Adi Paramartha
    Alief, Revin Naufal
    Akter, Rubina
    Kim, Dong-Seong
    Lee, Jae-Min
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18221 - 18236
  • [4] Detection of Cyber-Attacks of Power Systems Through Benford's Law
    Milano, Federico
    Gomez-Exposito, Antonio
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (03) : 2741 - 2744
  • [5] Detection of Cyber-Attacks with Zone Dividing and PCA
    Morita, T.
    Yogo, S.
    Koike, M.
    Hamaguchi, T.
    Jung, S.
    Koshijima, I.
    Hashimoto, Y.
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 727 - 736
  • [6] A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security
    Tatipatri, Naveen
    Arun, S. L.
    IEEE ACCESS, 2024, 12 : 18147 - 18167
  • [7] Collaborative Vehicle Platoons With Guaranteed Safety Against Cyber-Attacks
    Keijzer, Twan
    Chanfreut, Paula
    Maestre, Jose Maria
    Ferrari, Riccardo Maria Giorgio
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (01) : 295 - 308
  • [8] Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
    Manuel Guerrero-Higueras, Angel
    DeCastro-Garcia, Noemi
    Matellan, Vicente
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 99 : 75 - 83
  • [9] Analysis of jamming and spoofing cyber-attacks on drones
    Pey, Jeferson Nascimento Aquilar
    Nze, Georges Daniel Amvame
    Albuquerque, Robson de Oliveira
    Iberian Conference on Information Systems and Technologies, CISTI, 2022, 2022-June
  • [10] Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
    Kurt, Mehmet Necip
    Yilmaz, Yasin
    Wang, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 498 - 513